Cyber security representatives from the US and Britain have warned of Russian state-sponsored cyber-attacks that are targeting network infrastructure devices such as routers and firewalls, to compromise government and private sectors globally.
According to a US Computer Emergency Response Team (US-CERT), the Technical Alert (TA) provided information on the worldwide cyber exploitation of network infrastructure devices (routers, switches, firewalls, Network-based Intrusion Detection Systems) by Russian state-sponsored cyber actors.
The joint TA is the result of analytic efforts between the US Department of Homeland Security (DHS), the Federal Bureau of Investigation (FBI), and the UK's National Cyber Security Centre, according to information on the official website of the DHS.
"Victims were identified through a coordinated series of actions between US and international partners. The report builds on previous DHS reporting and advisories from the UK, Australia and the European Union," the website said.
"The FBI has high confidence that Russian state-sponsored cyber actors are using compromised routers to conduct man-in-the-middle attacks to support espionage, extract intellectual property, maintain persistent access to victim networks, and potentially lay a foundation for future offensive operations."
Since 2015, the US government has been receiving information from multiple sources -- including private and public sector cyber security research organisations and allies -- that cyber actors were exploiting large numbers of enterprise-class and residential routers and switches worldwide.
The government assessed that cyber actors supported by the Russian government carried out this worldwide campaign.
These operations enable espionage and intellectual property that supports the Russian Federation's national security and economic goals, the website said.
Russian cyber-actors leverage a number of legacy or weak protocols and service ports associated with network administration activities.
Cyber-actors use these weaknesses to identify vulnerable devices, extract device configurations, harvest login credentials, modify device firmware, and copy or redirect victim traffic through Russian cyber-actor-controlled infrastructure.
Organisations can use publicly available cyber security guidance and best practices from DHS, allied governments, vendors and the private-sector cyber security community on mitigation strategies for the exploitation vectors to safeguard their networks.
Meanwhile, an expert from cyber security company FireEye said that Russia has repeatedly leveraged cyber tools to protect its interests, especially when the country's prestige as a military superpower is threatened.
"For instance, when their place in the Olympics was embarrassingly lost, they lashed out with a campaign to undermine the legitimacy of the games, ultimately culminating in an attempt to disrupt the events themselves," John Hultquist, Director of Intelligence Analysis at FireEye, said in a statement.
"As in the Olympics, Russia is already seeking to undermine the legitimacy of the strikes through social media accounts we suspect are tied to the Internet Research Agency (IRA). They could complement these campaigns with targeted leaks as they did during the US elections."
Furthermore, more aggressive options such as cyberattack could be employed, though they may be considered too escalatory, Hultquist added.
--IANS
sku/ksk/hs
(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)
You’ve reached your limit of {{free_limit}} free articles this month.
Subscribe now for unlimited access.
Already subscribed? Log in
Subscribe to read the full story →
Smart Quarterly
₹900
3 Months
₹300/Month
Smart Essential
₹2,700
1 Year
₹225/Month
Super Saver
₹3,900
2 Years
₹162/Month
Renews automatically, cancel anytime
Here’s what’s included in our digital subscription plans
Exclusive premium stories online
Over 30 premium stories daily, handpicked by our editors


Complimentary Access to The New York Times
News, Games, Cooking, Audio, Wirecutter & The Athletic
Business Standard Epaper
Digital replica of our daily newspaper — with options to read, save, and share


Curated Newsletters
Insights on markets, finance, politics, tech, and more delivered to your inbox
Market Analysis & Investment Insights
In-depth market analysis & insights with access to The Smart Investor


Archives
Repository of articles and publications dating back to 1997
Ad-free Reading
Uninterrupted reading experience with no advertisements


Seamless Access Across All Devices
Access Business Standard across devices — mobile, tablet, or PC, via web or app
